The Latest in IT Security

Posts Tagged ‘t mobile’

T-Mobile has warned millions of its customers that a threat actor used an Application Programming Interface (API) to gain access to some of their sensitive data. In a warning published on the company’s website, T-Mobile tried to play down the importance of the incident, saying some “basic customer information (nearly all of which is the […]

Read more ...

Cybercriminals continue to create new ways to earn easy money, and every scheme seems to have its own unique flavor. Most recently, a former T-Mobile retail store owner was convicted for stealing employee credentials to illegally access internal computer systems and unlock and unblock cellphones. The U.S. Department of Justice (DOJ) says Argishti Khudaverdyan, 44, […]

Read more ...

Data breaches can be quite a complicated issue for organizations. No matter how good, or bad, your cybersecurity is, sophisticated threat actors always seem to find a way to make life difficult for a CISO. It’s then up to company leadership to make the right decisions. Disclose the breach, notify those affected, and talk with […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments